Sciweavers

1463 search results - page 173 / 293
» Model Checking Implicit-Invocation Systems
Sort
View
125
Voted
ICNC
2005
Springer
15 years 7 months ago
A Time-Series Decomposed Model of Network Traffic
: Traffic behavior in a large-scale network can be viewed as a complicated non-linear system, so it is very difficult to describe the long-term network traffic behavior in a large-...
Guang Cheng, Jian Gong, Wei Ding 0001
ENTCS
2008
106views more  ENTCS 2008»
15 years 1 months ago
Towards Verifying Model Transformations
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
Anantha Narayanan, Gabor Karsai
RTS
2008
131views more  RTS 2008»
15 years 29 days ago
Formal verification of multitasking applications based on timed automata model
The aim of this paper is to show, how a multitasking application running under a real-time operating system compliant with an OSEK/VDX standard can be modeled by timed automata. Th...
Libor Waszniowski, Zdenek Hanzálek
CCS
2006
ACM
15 years 5 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 5 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim